Information security audit: High-impact Strategies - What You Need to Know : Definitions, Adoptions, Impact, Benefits, Maturity, Vendors

ISBN
9781743045596
$39.95
Author Roebuck, Kevin
Format Paperback
Details
  • Active Record
  • Individual Title
  • Yes
An information security audit is an audit on the level of information security in an organization. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to the auditing logical security of databases and highlights key components to look for and different methods for auditing these areas. When centered on the IT aspects of information security, it can be seen as a part of an information technology audit. It is often then referred to as an information technology security audit or a computer security audit. However, information security encompasses much more than IT. This book is your ultimate resource for Information security audit. Here you will find the most up-to-date information, analysis, background and everything you need to know. In easy to read chapters, with extensive references and links to get you to know all there is to know about Information security audit right away, covering: se drag & drop to reorder wiki pages and chapters, Information security audit, ACL (software company), COBIT, Code audit, David Coderre, Computer Aided Audit Tools, Computer forensics, Computer fraud, Computer Fraud and Abuse Act, Continuous controls monitoring, Datacenter star audit, Enterprise risk management, History of information technology auditing, Host protected area, Information technology audit, Information technology audit process, Erik Laykin, Mobile device forensics, National Information Infrastructure Protection Act, SekChek Classic, SekChek Local, Statement on Auditing Standards No. 99: Consideration of Fraud This book explains in-depth the real drivers and workings of Information security audit. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Information security audit with the objectivity of experienced professionals.